Results 31 to 40 of about 751,340 (235)
Security Concerns in Cloud Computing [PDF]
Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around.
Gopal K. Shyam, Mir Abdul Samim Ansari
openaire +2 more sources
Cyber resilience and cyber security issues of intelligent cloud computing systems
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj
Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt+4 more
doaj +1 more source
Analysis and Practice of Cloud Computing Information Security
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong+3 more
doaj +2 more sources
A Security Perspective on Adoption and Migration to Mobile Cloud Technology
Security is one of the main concerns of those who want to adopt and migrate to cloud computing technology. Security issues raised by cloud technology reveals that mobile cloud computing is raising the privacy and security issues such as identification ...
Mohammad Bin Ghudayyer+2 more
doaj +1 more source
Data security in cloud computing [PDF]
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats.
Albugmi, Ahmed, Nammas+3 more
openaire +2 more sources
Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost ...
Yara Alghofaili+4 more
doaj +1 more source
A Review on Cloud Computing Security
Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software.
Teo, Marry+6 more
openaire +3 more sources
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj
Security Architecture for Cloud-Based Command and Control System in IoT Environment
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo+3 more
doaj +1 more source